A GitHub Action for managing Terraform modules in GitHub monorepos, automating versioning, releases, and documentation.
Simplify the management of Terraform modules in your monorepo with this GitHub Action. It automates module-specific versioning and releases by creating proper Git tags and GitHub releases based on your commit messages. Each module maintains independence while living in the same repository, with proper isolation for clean dependency management. Additionally, the action generates a beautifully crafted wiki for each module, complete with readme information, usage examples, Terraform-docs details, and a full changelog.
- Efficient Module Tagging – Only includes module directory content, dramatically improving Terraform performance.
- Smart Versioning – Automatically determines release types (major, minor, patch) based on commit messages.
- Comprehensive Wiki – Generates beautiful documentation with usage examples, terraform-docs output, and full changelogs.
- Release Automation – Creates GitHub releases, pull request comments, and version tags with minimal effort.
- Self-Maintaining – Automatically removes tags from deleted modules, keeping your repository clean and organized.
- 100% GitHub Native – No external dependencies or services required for modules or operation, everything stays within your GitHub ecosystem.
- Zero Configuration – Works out-of-the-box with sensible defaults for immediate productivity.
- Flexible & Extensible – Customizable settings to precisely match your team's specific workflow requirements.
Check out our Terraform Modules Demo repository for a practical example of how to use this action in a monorepo setup. See real-world usage in action:
Before using this action, make sure that the wiki is enabled and initialized for your repository:
- Go to your repository's homepage.
- Navigate to the Settings tab.
- Under the Features section, ensure the Wikis option is checked to enable the GitHub Wiki.
- Navigate to the Wiki tab on your repository.
- Click the Create the first page button and add a basic title like Home to initialize the wiki with an initial commit.
- Save the changes to ensure your wiki is not empty when the GitHub Action updates it with module information.
Add the following YAML to your .github/workflows
directory:
name: Terraform Module Releaser
on:
pull_request:
types: [opened, reopened, synchronize, closed] # Closed required
branches:
- main
permissions:
contents: write # Required for to push tags, create release, and push changes to the wiki
pull-requests: write # Required to comment on pull request
jobs:
release:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Terraform Module Releaser
uses: techpivot/terraform-module-releaser@v1
This configuration provides an out-of-the-box solution that should work for most projects, as the defaults are reasonably configured.
If you need to customize additional parameters, please refer to Input Parameters section below.
Before executing the GitHub Actions workflow, ensure that you have the necessary permissions set for accessing pull requests and creating releases.
- By default, this GitHub Action uses the
GITHUB_TOKEN
associated with the workflow. To properly comment on pull requests and create tags/releases, the workflow permission forpull-requests
must be set to"write"
. - Additionally, the workflow permission for
contents
must also be set to"write"
to allow the action to create tags and releases. - For security considerations and best practices when using the
github_token
, please refer to the Security Documentation. - Ensure the Restrict editing to users in teams with push access only setting is enabled for public repositories, as the GitHub Actions Bot can write to the wiki by default.
If the permissions are insufficient, the action may fail with a 403 error, indicating a lack of access to the necessary resources.
-
Avoid placing nested Terraform modules within a sub-directory of another module, as this practice can lead to issues with dependency management and module separation. Instead, structure your repository with multiple levels of folders/directories to organize modules while keeping each Terraform module isolated within its dedicated directory. This approach promotes maintainability and helps ensure clarity across modules.
-
We recommend structuring modules with a top-level namespace that is related to a major provider (e.g.,
aws
,azure
, ornull
). Within this namespace, use a nested directory to house the actual module with a name that corresponds closely to its intended purpose or resource. For example:├── aws │ ├── vpc │ └── ec2 ├── azure │ ├── resource-group │ └── storage-account └── null └── label
While the out-of-the-box defaults are suitable for most use cases, you can further customize the action's behavior by configuring the following optional input parameters as needed.
Input | Description | Default |
---|---|---|
major-keywords |
Keywords in commit messages that indicate a major release | major change,breaking change |
minor-keywords |
Keywords in commit messages that indicate a minor release | feat,feature |
patch-keywords |
Keywords in commit messages that indicate a patch release | fix,chore,docs |
default-first-tag |
Specifies the default tag version | v1.0.0 |
terraform-docs-version |
Specifies the terraform-docs version used to generate documentation for the wiki | v0.19.0 |
delete-legacy-tags |
Specifies a boolean that determines whether tags and releases from Terraform modules that have been deleted should be automatically removed | true |
disable-wiki |
Whether to disable wiki generation for Terraform modules | false |
wiki-sidebar-changelog-max |
An integer that specifies how many changelog entries are displayed in the sidebar per module | 5 |
disable-branding |
Controls whether a small branding link to the action's repository is added to PR comments. Recommended to leave enabled to support OSS. | false |
module-path-ignore |
Comma separated list of module paths to completely ignore (relative to working directory). This will prevent any versioning, release, or documentation for these modules. | `` (empty) |
module-change-exclude-patterns |
A comma-separated list of file patterns to exclude from triggering version changes in Terraform modules. Patterns follow glob syntax (e.g., .gitignore,_.md ) and are relative to each Terraform module directory. Files matching these patterns will not affect version changes. WARNING: Avoid excluding '_.tf ' files, as they are essential for module detection and versioning processes. |
.gitignore, *.md, *.tftest.hcl, tests/** |
module-asset-exclude-patterns |
A comma-separated list of file patterns to exclude when bundling a Terraform module for tag/release. Patterns follow glob syntax (e.g., tests/\*\* ) and are relative to each Terraform module directory. Files matching these patterns will be excluded from the bundled output. |
.gitignore, *.md, *.tftest.hcl, tests/** |
use-ssh-source-format |
If enabled, all links to source code in generated Wiki documentation will use SSH standard format (e.g., git::ssh://git@github.com/owner/repo.git ) instead of HTTPS format (git::https://github.com/owner/repo.git ) |
false |
-
module-path-ignore
: Completely ignores specified module paths. Any module whose path matches any pattern in this list will not be processed at all by the action. This is useful for:- Excluding example modules (e.g.,
**/examples/**
) - Skipping test modules (e.g.,
**/test/**
) - Ignoring documentation-focused modules (e.g.,
**/docs/**
) - Excluding entire directories or paths that contain Terraform files but shouldn't be versioned as modules
Example:
module-path-ignore: "**/examples/**,**/test/**,root-modules"
- Excluding example modules (e.g.,
-
module-change-exclude-patterns
: These patterns determine which file changes are ignored when checking if a module needs a new release. For example, changes to documentation, examples, or workflow files typically don't require a new module release. -
module-asset-exclude-patterns
: When building a release asset for a module, these patterns determine which files are excluded from the asset. This helps reduce the asset size by omitting test files, examples, documentation, etc.
All pattern matching is implemented using minimatch, which supports glob patterns
similar to those used in .gitignore
files. For more details on the pattern matching implementation, see our
source code or visit the
minimatch documentation.
name: Terraform Module Releaser
on:
pull_request:
types: [opened, reopened, synchronize, closed] # Closed required
branches:
- main
permissions:
contents: write # Required for to push tags, create release, and push changes to the wiki
pull-requests: write # Required to comment on pull request
jobs:
release:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Terraform Module Releaser
uses: techpivot/terraform-module-releaser@v1
with:
major-keywords: major update,breaking change
minor-keywords: feat,feature
patch-keywords: fix,chore,docs
default-first-tag: v1.0.0
terraform-docs-version: v0.19.0
delete-legacy-tags: true
disable-wiki: false
wiki-sidebar-changelog-max: 10
module-change-exclude-patterns: .gitignore,*.md,*.tftest.hcl,tests/**
module-asset-exclude-patterns: .gitignore,*.md,*.tftest.hcl,tests/**
use-ssh-source-format: false
module-path-ignore: path/to/ignore1,path/to/ignore2
The following outputs are available from this action:
Output | Type | Description |
---|---|---|
changed-module-names |
string |
JSON array of module names that were changed in the current pull request |
changed-module-paths |
string |
JSON array of file system paths to the modules that were changed |
changed-modules-map |
string |
JSON object mapping module names to their change details including current tag, next tag, and release type |
all-module-names |
string |
JSON array of all module names found in the repository |
all-module-paths |
string |
JSON array of file system paths to all modules in the repository |
all-modules-map |
string |
JSON object mapping all module names to their details including path, latest tag, and latest tag version |
{
"changed-modules-map": {
"aws/vpc": {
"path": "modules/aws/vpc",
"currentTag": "aws/vpc/v1.0.0",
"nextTag": "aws/vpc/v1.1.0",
"releaseType": "minor"
}
},
"all-modules-map": {
"aws/vpc": {
"path": "modules/aws/vpc",
"latestTag": "aws/vpc/v1.0.0",
"latestTagVersion": "v1.0.0"
},
"aws/s3": {
"path": "modules/aws/s3",
"latestTag": "aws/s3/v2.1.0",
"latestTagVersion": "v2.1.0"
}
}
}
This action was inspired by the blog post GitHub-Powered Terraform Modules Monorepo by Piotr Krukowski.
- This action uses Conventional Commits to automatically determine the release type (major, minor, or patch) based on commit messages. This behavior is configurable via inputs.
- Versioning is done using Semantic Versioning (SemVer), which provides a clear and consistent way to manage module versions.
- Commit messages are linked to the respective Terraform directories (handling PRs that may have separate modules and changed files).
- Unlike the original inspiration, which relied on labels for tagging and versioning, this action leverages commit messages to determine the release type. This approach simplifies the process and eliminates the complexity introduced by labels, which were PR-specific and didn't account for individual commits per module. By using commit messages, we can now accurately tag and version only the relevant commits, providing a more precise and efficient release management process.
- 100% GitHub-based: This action has no external dependencies, eliminating the need for additional authentication and complexity. Unlike earlier variations that stored built module assets in external services like Amazon S3, this action keeps everything within GitHub, providing a self-contained and streamlined solution for managing Terraform modules.
- Pull Request-based workflow: This action runs on the pull_request event, using pull request comments to track permanent releases tied to commits. This method ensures persistence, unlike Action Artifacts, which expire. As a result, the module does not support non-PR workflows, such as direct pushes to the default branch.
The scripts and documentation in this project are released under the MIT License.
For detailed information about security practices and guidelines, check out the Security Documentation.